Sunday, January 26, 2020
Performance Analysis for AD-HEED and N-HEED
Performance Analysis for AD-HEED and N-HEED 4.1 Results and Discussion In this section, we exhibit and discuss the results of the simulation. This section shows the performance analysis for AD-HEED and N-HEED compared to the original HEED protocol. Every result presented is the average of five experiments. The following sections give a detailed description of the experiments and the results. 4.4.1 Network Lifetime The number of alive nodes for each round is observed for AD-HEED and N-HEED compared to HEED protocol to evaluate the lifetime of the network. In the proposed methods and according to the distance between the CH and its anchor, we proposed AD-HEED30, AD-HEED87, N-HEED30 and N-HEED87. 30 and 87 are the distance between the CH and its anchor (dch_to_Anc) where 30 is the cluster radius and 87 is the threshold distance which depends on the environment. According to simulation results, AD-HEED87 and N-HEED87 have the same results for all experiments so N-HEED87 results will not be appeared in any figure. In all of the experiments, the sensor nodes were deployed uniformly. Figure ââ¬Å½4ââ¬â1 shows the performance of HEED protocol compared to AD-HEED and N-HEED. It is observed that AD-HEED87 outperforms HEED and the other proposed methods. AD-HEED87 increases the network lifetime until all nodes consume their whole energy by more than 150 rounds compared with HEED protocol. N-HEED30 also increases the network lifetime by more than 50 rounds until the whole nodes die. Figure ââ¬Å½4ââ¬â1: Number of alive nodes per rounds Figure ââ¬Å½4ââ¬â2 presents how AD-HEED and N-HEED behave with HEED protocol in term of node death percentage. The figure below shows the number of rounds for 10%, 25%, 50%, 75% and 90% of nodes that consume their whole energy. The results show that AD-HEED and N-HEED outperform HEED throughout the network. There is a slight advantage to HEED on AD-HEED30 in 90% of nodes death .The figure shows that for 10% of nodes death, the best choice is AD-HEED30 and N-HEED30 while the best choice for 75% and 90% of nodes death is AD-HEED87. For 25% and 50% of nodes death the best choice occurs with all proposed methods because they are approximately the same. According to both of figures, the results show that our proposed methods outperform HEED. Figure ââ¬Å½4ââ¬â2: Node death percentage per rounds 4.4.2 Energy Consumption Analysis The performance of AD-HEED and N-HEED is compared with that of HEED protocol in term of energy consumption for data transmission between CHs and the base station. Figure ââ¬Å½4ââ¬â3 reveals the ratio of energy consumption for AD-HEED and N-HEED per rounds compared with HEED. Here, the energy consumption is the energy consumed by nodes to transmit data to the base station. According to the listed parameters, the results show that the energy consumption for data transmission between CHs and the base station is approximately 19% from the whole energy in HEED protocol. According to our experiments, we have a network that consists of 200 sensors deployed in 100m Ãâ" 100m, the base station located away at (200, 200) from the surrounding area and the initial energy for each node is 2 J. The total energy for 200 nodes is 400 J and then the energy consumed to transmit data from CHs to the base station is 76 J (19% of 400 J). The figure below shows that AD-HEED87 is the lowest energy c onsuming and then N-HEED30 and AD-HEED30 respectively which means that all of them consumed energy lower than that consumed by HEED. AD-HEED87 decreases the energy consumption by HEED by almost 47% and this means it consumes 36 J for data transmission. Figure ââ¬Å½4ââ¬â3: The ratio of energy consumption per rounds Figure ââ¬Å½4ââ¬â4 presents the ratio of energy consumption in data transmission in term of node death percentage. The figure below shows the ratio of energy consumption for 10%, 25%, 50%, 75% and 90% of nodes that consume their whole energy. As it is obviously clear from the figure, AD-HEED and N-HEED consume lower energy than HEED throughout the network. AD-HEED87, N-HEED30 and AD-HEED30 are the lowest energy consumption respectively. Figure ââ¬Å½4ââ¬â4: The ratio of energy consumption for AD-HEED, N-HEED and HEED Table ââ¬Å½4ââ¬â2 reveals the improvement of energy consumed for data transmission of AD-HEED and N-HEED on HEED protocol for 10%, 25%, 50%, 75% and 90% of nodes death. The comparison results shown in Table ââ¬Å½4ââ¬â2 depict that AD-HEED87, N-HEED and AD-HEED30 respectively are more energy efficient than HEED throughout the network. It is worth mentioning here that the data transmission energy is the energy consumed to transmit data from CHs to the base station. Table ââ¬Å½4ââ¬â2: Improvement of AD-HEED and N-HEED on HEED protocol 4.4.3 Variance of the Base Station Location In this set of experiments we evaluate how varying the location of the base station could effect on both schemes; AD-HEED and N-HEED in term of network lifetime and energy consumption. Figure ââ¬Å½4ââ¬â5 compares the lifetime of the network of AD-HEED and N-HEED with HEED, where the network lifetime is the time until the first 10% of nodes die and when the locations of the base station are (150, 150), (200, 200) and (250, 250) on x-coordinate and y-coordinate. Similar comparisons are conducted for the network lifetime in term of HND and LNA10% as exhibited in Figure ââ¬Å½4ââ¬â6 and Figure ââ¬Å½4ââ¬â7 respectively. Both approaches improve the network lifetime with different locations for the base station compared to HEED protocol. Figure ââ¬Å½4ââ¬â5 shows that AD-HEED30 is the best choice where the network lifetime is FND10%. Figure ââ¬Å½4ââ¬â5: Comparing HEED with AD-HEED and N-HEED using different locations of the base station for FND10% metric Figure ââ¬Å½4ââ¬â6 and Figure ââ¬Å½4ââ¬â7 show that AD-HEED87 and N-HEED30 prolong network lifetime in term of HND and LNA10% while AD-HEED30 prolongs network lifetime in term of HND and LNA10% while AD-HEED30 prolongs network lifetime in term of HND. Thus, for the application that requires that at least 90% of nodes should work, AD-HEED30 is the best choice and appropriate for improving the network lifetime in term of FND10%. If the demand of the application is to boost the lifespan of the network in term of LNA10%, then AD-HEED87 will be appropriate because they improve the network lifetime in term of LNA10% significantly. Figure ââ¬Å½4ââ¬â6: Comparing HEED with AD-HEED and N-HEED using different locations of the base station for HND metric It can be easily observed form Figure ââ¬Å½4ââ¬â5, Figure ââ¬Å½4ââ¬â6 and Figure ââ¬Å½4ââ¬â7 that if the base station location is farther, the network lifetime will decrease in term of FND10%, HND and LNA10% in AD-HEED and N-HEED. The decreasing of network lifetime is due to consuming more energy to transmit data to the base station. We know that the anchor or CH consumes (k (Eelec + Eamp * dn)) J to transmit k-bit message to the base station where n = 2 for d 0, and n = 4 for d âⰠ¥ d0. Thus, the distance between the closest node and the base station according to the experiments is greater than 87 (d0) so n = 4 all the time. In other words, whenever the base station was nearer, CHs and anchors will consume less energy to deliver data to the base station and vice versa. This means that the distance between CHs or anchors and the base station is a critical factor which effects on the energy consumption. Figure ââ¬Å½4ââ¬â7: Comparing HEED with AD-HEED and N-HEED using different locations of the base station for LNA10% metric The following three figures present the energy consumed in Joules by HEED, AD-HEED and N-HEED using different locations of the base station. From the figures, it is clear that AD-HEED and N-HEED consume less energy than HEED protocol throughout the network. The energy saving by the proposed method increases as the location of the base station was farther. The explanation of this was aforementioned. It is clear from the figures that the fraction of improvement decreases as we go through the network lifetime. In other words, the fraction of improvement in the energy consumption for FND10% is greater than that for HND and LNA10%. This is due to that in the earlier periods of the network lifetime there are a lot of nodes that not consume their whole energy. Thus, CHs can select the beast node as anchor which is the closest node to the base station. But in the in the later periods of the network lifetime, a lot of nodes die. Thus, some of CHs may not use anchor to transmit data the base s tation or select a node as anchor which not effect on energy consumption impressively. Figure ââ¬Å½4ââ¬â8, Figure ââ¬Å½4ââ¬â9 and Figure ââ¬Å½4ââ¬â10 reveal that AD-HEED87 is the most energy saving and then N-HEED30 and AD-HEED30. Figure ââ¬Å½4ââ¬â8: The energy consumption using different locations of the base station for FND10% metric Figure ââ¬Å½4ââ¬â9: The energy consumption using different locations of the base station for HND Figure ââ¬Å½4ââ¬â10: The energy consumption using different locations of the base station for LNA10% metric 4.4.4 Variance of the Number of Sensors We also evaluate the effectiveness of increasing number of the nodes on both methods; AD-HEED and N-HEED. Figure ââ¬Å½4ââ¬â11 compares the lifetime of the network of HEED to AD-HEED and N-HEED, where the network lifetime is FND10% and when the number of nodes is varied between 150, 200, 250 and 300 nodes. Identical comparisons are conducted for HND and LNA10% as depicted in Figure ââ¬Å½4ââ¬â12 and Figure ââ¬Å½4ââ¬â13 respectively. Both methods improve the network lifetime as the number of nodes increases. The figures show that, in almost all cases, AD-HEED and N-HEED performs better than HEED. This improvement is also due to using the anchor as intermediate between CHs and the base station. This increases the network lifespan and decreases the energy consumption. The figures show that AD-HEED30 outperforms the others in term of FND10% while AD-HEED87 outperforms the other in term of LNA10% as the number of sensors increases. AD-HEED87 and N-HEED30 are approximately the same with a slight advantage to AD-HEED87 in term of HND. Figure ââ¬Å½4ââ¬â11: Comparing HEED with AD-HEED and N-HEED using different number of sensors for FND10% metric Figure ââ¬Å½4ââ¬â12: Comparing HEED with AD-HEED and N-HEED using different number of sensors for HND metric Figure ââ¬Å½4ââ¬â13: Comparing HEED with AD-HEED and N-HEED using different number of sensors for LNA10% metric The following three figures present the energy consumed in Joules by HEED, AD-HEED and N-HEED using different number of sensors. Figure ââ¬Å½4ââ¬â14: The energy consumption using different number of sensors for FND10% metric It is obviously clear that AD-HEED and N-HEED are more energy efficient because they consume less energy than HEED protocol in all experiments throughout the network. It can be easily observed form the figures that the percentage of improvement is almost the same when the number of the nodes increases. So, the proposed methods doesnââ¬â¢t affect by varying the number of sensors. Figure ââ¬Å½4ââ¬â15: The energy consumption using different number of sensors for HND metric Figure ââ¬Å½4ââ¬â16: The energy consumption using different number of sensors for LNA10% 4.4.5 Results Analysis In HEED protocol, each sensor gathers data and forwards it to its CH. CHs in turn aggregate data from sensors and transmit it to the base station which located far away from the surrounding area. CHs consume their energy during data aggregation from sensors, data compression per signal and forwarding them to the base station. Where ET is energy consumed for transmission of K bits for distance d, ER is energy consumed for receiving, Eelec is energy consumed by the sensor node circuit, Eamp is the energy consumed by amplifier and Efus is the energy consumed for data fusion. Our proposed technique focuses on data transmission between CHs and the base station. The energy consumed by CH to transmit data to the base station directly (EnDir) represents a certain percentage of the whole energy. This percentage differs according to many factors such as the base station location, number of sensors and etc. the energy consumed for direct data transmission is calculated as the following: EnDir = EnCH_to_BS EnCH_to_BS = The energy consumed to transmit data to the base station indirectly via anchor (EnIndir) is calculated as the following: EnIndir = EnCH_to_Anc + EnAnc_to_BS EnCH_to_Anc = (1) EnAnc_to_BS = + (2) Where n =2 if d 0 or n = 4 if d > d0. The energy of (1) is consumed for transmission data to the anchor by CH while the energy of (2) is consumed for receiving data from CH and forwarding it to the base station by anchor. In AD-HEED, CHs transmit the collected data to their anchors if EnDir > EnIndir and anchors in turn transmit data to the base station. Otherwise CHs transmit the gathered data to the base station directly. In N-HEED and in addition to AD-HEED, the current anchors transmit the gathered data to the next anchors if EnDir > EnIndir and the next anchors in turn transmit data to the base station. Otherwise the current anchors transmit the gathered data to the base station directly. Figure ââ¬Å½4ââ¬â17shows the detailed description of how can transmitting data via anchors reduce the energy consumption. If we assume that the point a is the CH, d is the base station and b, c and e are hypothetical points that located in the CHââ¬â¢s transmission range which represented by a circle. The deployment field is 100m x 100m and the base station located away at (200, 200) m from the network field. The transmission range is 30 (cluster radius). ac = ab = 30. ad is the distance between CH and the base station while bd, cd and ed are the distances between the points b, c and e respectively and the base station. According to our proposed technique, CH selects the closest sensor to the base station to be its anchor and it should be closer than CH itself. Firstly, we assume that the distance between the base station (d) and point (c) is equal to the distance between the base station and CH (a). After that, we reduce the distance cd by moving the position of point c and calculate the energy consumed to transmit one byte from CH (a) to the base station directly (EnDir) and the energy consumed to transmit one byte from CH to the base station indirectly (EnIndir) via point (c). This operation repeats many times until EnDir > EnIndir. The same operations are conducted with point (b). After testing and calculation and by assuming that c, b and e are sensors, we get that cd and bd are the maximum distances while ed is the minimum distance in which sending data to the base station indirectly via sensors c, b or e consumes less energy than sending data directly from CH to the base station. Now, we can see that for any sensor located in the gray zone in the circle and has a distance to the base station less than the maximum distance, transmitting data from CH to the base station via any of these sensors will consume less energy than energy consumed by transmitting data from CH directly to the base station. Figure ââ¬Å½4ââ¬â17: The mechanism of sending data via anchors Chapter Two: Conclusions and Future work 5.1 Conclusions In this research, we proposed an efficient mechanism for hierarchal protocols of wireless sensor networks which proved to be more efficient in the use of energy than HEED protocol in most cases. The main contribution is to allow CHs to transmit data by using other sensors called anchors as intermediates which are closer to the base station than CHs. Furthermore, this approach reduces the burden from the CHs which consume their energy by collecting data from sensors and forwarding them to the base station. The sensor which has the collected data compares between the energy consumed in case if it transmits data directly to the base station and if it transmits data indirectly to the base station via its anchor. After that, the sensor decided either to transmit data directly or via anchors to the base station base on way that consumes less energy. We compared and evaluated the proposed approach performance with the HEED protocol in terms of network lifetime and energy consumption. Simula tion results depict that the proposed methods which called AD-HEED and N-HEED perform better than HEED. The improvement percentage relies on the best choice of the distance between the CH and the anchor, the evaluation metrics and the properties of the wireless sensor network. This improvement is because of that the sensor consumes much less energy when they transmit data to sensor closer than another. We know that the CH consumes (k (Eelec + Eamp * dn)) J to transmit k-bit message to the base station. If the distance between CH and the base station less than threshold distance, the energy consumption equation is calculated by using distance to the power of 2 otherwise, to the power of 4. So, the energy consumption is decreased by using anchors which allow sensors to transmit data via short distances until all data received by the base station. According to simulation results, the distance between CH and the base station is very critical factor which effects on the network lifetime and energy consumption .Furthermore; we also conduct a performance evaluation between our proposed approach and HEED protocol by using different number of sensors and different locations of the base station. The simulation results show that the variation in the number of sensors doesnââ¬â¢t affect significantly on the percentage of improvement. The simulation results show also that the percentage of improvement decreases as the location of the base station was farther because the sensors consume more energy whenever transmitting data over long distances. 5.2 Future Work Though considerable effort has been made on this thesis, many ideas regarding the subject are still not investigated. This section outlines and presents some of our future plans to be conducted in order to improve this work. The choosing of anchors in our approach depended entirely on the distance between the sensors and the base station where CHs choose the closest sensor to the base station. We think to make the choosing of anchors more controlled by taking into account different conditions and other related parameters such as the residual energy, the positions of the nodes and the received signal strength. The collected data by sensors is transmitted by CHs to one base station. This assumption is similar to that in HEED protocol. For scenarios where there are more than one base station located in different locations, each CH should transmit data to the suitable base station. Thus, studying how our proposed approach behaves with these scenarios is a very good idea to be conducted for future work. Finally, the energy consumption and network lifetime are the only performance metrics that are used to evaluate our proposed approach. Using other performance metrics such as throughput, latency and packet delivery ratio to evaluate the proposed approach is a good idea to be conducted for future work.
Saturday, January 18, 2020
Biggest Issues Facing Managers
Alando Ford MGT521/Management Jim Holst October 25, 2009 Retention One of the most pressing challenges facing todayââ¬â¢s managers is keeping their best people. In todayââ¬â¢s economy companies separate themselves by the talented people they recruit. Some ways companies can improve their retention rate are obvious. One way companies can cut turnover is by qualifying the personnel they are hiring and carefully analyzing what the different roles in their organization are. Next they must make a realistic decision regarding what skills and abilities are required to fill this role. Recent research has proven that there is a direct link between training and employee retention. Employees involved in ongoing training feel that their employer is interested in them doing a good job, and the employer cares enough about them to make an investment in their development. ââ¬Å"Training can also be the means for positive change in any organization; however, training is not enough to create lasting change without a vital link that will help employees transfer what they learned into real-life application. That vital link is a strong coaching program. Coaching comprise the following features which needs to be articulated in the best manner in order to get one hundred percent from the employeesâ⬠. (Mirsha, Remedies for the biggest challenges in business today, pg. 1 para. 3). Strategy and cost effective business models ââ¬Å"Personally I believe that the most difficult task is finding a positive cash flow business model. It isnââ¬â¢t that difficult to source good products, and customers will appear if sufficient money is spent on advertising or other promotion. This is all pointless if the cost exceeds the revenue from all of this, i. e. he net assets of a business fall to zero, and the business ceases to operateâ⬠. (Mark McIlroy-Director, Blue Sky Technology) With the economy in a crisis and unemployment at staggering rates, businesses of all types are feeling the crunch. Companies must continue to focus on customer service. This practice will help retain their existing client base, while allowing them to make a posi tive impression on new customers. In the flow of business, people are the most important element no matter the product or service. Creating partnerships reduce costs and increase referral rates when companies align themselves. Even the most pessimistic of economists today are saying that the actual numbers in the current recessions are a reduction in gross domestic product (GDP) by two percent annually and just through 2009, and yet most businesses talk and act if business is off thirty percent. (Johnese, 2009, Todayââ¬â¢s Business Professional) So, the number one challenge is to realize that it might be harder to do business right now, but thereââ¬â¢s more business to be done, market share to be gained, while the other guy sits around or slows down waiting for things to improve. â⬠(Stephen Kann- CEO at Policy Settlement Associates, Inc. Conclusion By understanding the factors that drive business in todayââ¬â¢s economy companies will be better prepared to be successful in this market. They will have to rely more on the skills and tools they have available. They will have to become more aggressive when it comes to recruiting and retaining good employees. Companies need to continue to revamp o lder processes that no longer work, by adding newer more innovative systems. Companies should understand that the challenge that lies ahead is transitioning from a service provider to a business manager. This transition will be necessary; if the primary goal of the business is to make money. Companies will be able to increase their profits while minimizing their losses. Admin (2009, February 16). Todayââ¬â¢s Small Business Challenges. Retrieved from http://www. babeofbusiness. com Johnese, Daniel (2007). Todayââ¬â¢s Business Professional. Retrieved from http://www. jobbankusa. com Mishra, Sonika(2008,October 13). Employee Retention- Remedies for the Biggest Challenge in Business Today. Retrieved from http://www. articlesbase. com
Friday, January 10, 2020
Cyber Terrorism
ââ¬ËTerrorismââ¬â¢ is a tough terminology to define. Many schools of thought exist about it, who takes a look upon it with varying perceptions according to their ethnicity, education, cultural groom and personal preferences. Terrorism may take a form of religious duty at one place, a form of revenge at another, a tactical or strategic arm or threat, a justified form of resistance to oppression or a coercive power for armed forces; conclusively whatever shape it takes, it causes violence, may it be on human or nature.Moving along the revolutionary change brought about since the last century is mainly because of information. Robin Morgan, famous feminist activist, writer and poet, summed it up by saying ââ¬Å"Information is power. The secreting or hoarding of knowledge or information may be an act of tyranny camouflaged as humility. â⬠Unfortunately or not, this world is being completely obsessed in the husk called information warfare. Itââ¬â¢s not the time anymore when military would be a sign of arrogance and symbol of pride and power of a nation; today military is the last resort to take over any territory.This new form of warfare is an offensive onslaught or a defensive mechanism, adopted in order to ââ¬Ëdenyââ¬â¢, ââ¬Ëexploitââ¬â¢, ââ¬Ëcorruptââ¬â¢ or ââ¬Ëdestroyââ¬â¢ rivalââ¬â¢s information based systems, like computer networks and Information systems (Goldberg, Director IASIW). In simplest words, itââ¬â¢s a discipline that has originated a smarter way to tackle oneââ¬â¢s adversary. Putting together the Information warfare with terrorism, the greatest fears of twentieth century are combined together as ââ¬Å"Cyber terrorismâ⬠(Patrick, 2002) IMPORTANT CONCEPTSCyber Terrorism The phrase ââ¬ËCyber Terrorismââ¬â¢ is one of the most ambiguously defined term, or should we say that information warfare has propagated the definition of Cyber-terrorism in order to limit or disrupt the main cause of Terroris m. Major discussion today is regarding the scope of cyber-terrorism, as it is overlapping with cyber-crime, cracking and terrorism (Baranetsky, 2009). Major discrimination between these crimes is on the basis of motivation, methods, targets and the involvement of computer system.Technically, cyber terrorism and information warfare are the same things, but thereââ¬â¢s a practical difference. Cyber terrorism is originated by politically motivated groups, disrupted individuals, or cyber cracking facilitators against information, computer systems and networks, in order to target nonviolent portions in society; whereas, Information warfare is originated by national defences against information, computer systems and networks in order to aggravate the enemy losses (Colarik & Janczewski, 2005). Ideological ExtremismAnother profound and old notion of human history is extremism. It is usually associated with religion, ideological and political practices of people which are not in accordanc e with generally accepted norms of a religion, society or a political setup. Itââ¬â¢s not something that could be easily defined in words, but when one sees it, it is recognized (Sotlar, 2004). Recently, the element of terrorism has taken its roots in those extremist people, and they have developed the ideology against forces, that are held together to fight the rising terrorism in the globe.Most known of these extremists are people of Al-Qaeda who, so called on the name of Islam, are spreading their ideological extremism, not only through militia warfare, but also electronic and information warfare. Cyber terrorism and Ideological Extremism Talking about the national security, the two major concerns of every nation today are terrorism and ideological extremism. Both are the sources of violence, may it be political or ethnical in nature (Gunaratna, 2008). Major source of both these concern today is Al-Qaeda.Originated by Osama Bin Laden, leader of Al-Qaeda, today they are the sou rce of terrorism all over the world. With recent transformation from an operational to ideological organization, today the pose the greatest threat not only to non-Muslims, but to Muslims and Islam as well. Now the idea behind this shift is to dismantle the social structures and religious beliefs into ideological extremism such that people of Asia, Africa and Middle East stand and operate for them on the front line. In simple words, theyââ¬â¢re brain-washing and making terrorists.STATEMENT OF PROBLEM Recent developments from this ââ¬Å"Jihadiâ⬠movement have come in the form of extremist articles on the websites. Through various websites, they are prompting targeted people into expressing their views about articulated beliefs that are designed to brain-wash the mind of those people. Other recent propaganda of extremist views encompasses political repression, racism, ethnical conspiracies, religious cults, Jihadists movements and religious fallacies. Certainly or not, is ide ological extremism open terrorism?Are these terrorists making use of internet to indulge people into morally, ethically and socially wrong activities that are endangering all their surroundings? Certainly we need to find how cyber terrorists are expanding their spectrum of operations and are including those vulnerable people as the match stick to next bomb to be exploded anywhere in the world. LITERATURE REVIEW As we stepped into the twentieth century, we were welcomed by some uprising, strong challenges that have so far consumed most portion of the worldââ¬â¢s economy. Terrorism was one of them.With terrorism finding its roots in many different countries, terrorists have diversified their operational methodology. Now at the front end, they are fighting by using one of us. The new revolution of Ideological Extremism, especially in the name of Islam, is taking its roots into the youngsters. Not surprisingly, those terrorists have exploited the simple connection of whole world, int ernet. Apart from the major role of U. S led war on terrorism, two other important fundamentalists are United Kingdom and the Kingdom of Saudi Arabia. Anti-terrorism policy of Saudi Arabia is mostly termed as ââ¬Å"soft counterterrorismâ⬠.But over the period of time, it has been proven successful (Hegghammer, 2010). They have reacted calmly to the situation, and by using their local preachers, they have successfully tackled those terrorist militants (Hegghammer, 2010) who were there with the intent of disrupt the government structure of Royal family, who had supported U. S. in its war against terrorism (Miller, 2003). They didnââ¬â¢t only counter those ideological extremists but also started a rehabilitation program in order to neutralize their extreme beliefs with reality and norms of Saudi culture (Boucek, 2008).They are also concerned about the uprising ideological extremism in the country (Saleh, 2006). They reinstated their solid stance against terrorism, and they with held their stance against any part involved in terrorism (Source: Arab News: 2010). U. S. , which was previously accusing Saudi Arabia to be an ally of Al-Qaeda (Sperry, 2002), commended the efforts of Saudi Arabia in controlling those terrorist activities, and rehabilitation of detained militants (Source: Saudi Embassy, 2009 ââ¬â 2010).UK has well-defined laws for terrorism, and are actively involved in reviewing and improving them, as per the current terrorist threats (Source: Foreign and Commonwealth Office). Following the incident of 9/11, UK adopted policies to minimize the developing security threats from terrorists (Browning, 2005). They experienced their major setback in the month of July, 2005, when in London bombings, more than fifty travellers were killed, leaving 700 injured. To the surprise of British, the leader of those terrorist attacks was British born Muslim (Talbot, 2006).Since then, Islamism is considered a threat in UK, may it be in any of its form (Readings , 2010). The widespread of this ideological extremism is very much attributed to the up-rising cyber terrorism, and use of internet to propagate local people about their home countries, brainwashing them, and making them fight for terrorists (Gunaratna, 2008). RESEARCH IMPORTANCE Importance of internet today is more of a necessity than a luxury. It outweighs endless opportunities to all the people around the globe to retrieve or share anything they want to.Freedom of speech and lack of centrally aligned governing body has exposed the contents of internet to boundless criticism from different sects in the world. But in this up-rising assault of information warfare, cyber-terrorism and ideological extremism, itââ¬â¢s the time for the authorities to sit back and define the limitations of this free source. Before legitimatizing the use of internet, it would be important to keep in mind the reasons behind following. â⬠¢ Spectrum of cyber-terrorism: what exactly comes in it? â⬠¢ Need of regulating the flow of information on internetâ⬠¢ Why ideological extremism exists? â⬠¢ What are the factors leading to innocent people ending up terrorist? â⬠¢ What lacks in the social structure that is prompting such activities? â⬠¢ How the use of internet is provoking extremism in up-coming generation â⬠¢ Who are propagating the information to provoke such behavior â⬠¢ Are we ready to fight this front of terrorism â⬠¢ Is there any social remedial for a terrorist? With this research, we are aiming to find out the reasons behind all these above mentioned issues. Terrorists are humans, but they have opted the wrong way. Are they smarter than us?There is a big question mark on the upcoming days, as international security continues to be threatened by extremists. CONTRIBUTION TOWARDS THE KNOWLEDGE This research is expected to bring forward key reasons behind the amalgamation of two concepts, cyber-terrorism and ideological extremism, to bring forw ard a new front in the war against terrorism. Through this research, we aim to: â⬠¢ Understand the ideology behind use of internet to spread extremism â⬠¢ Understand policies adopted majorly by, Muslim world leader, Saudi Arabia and, the economic giant, United Kingdom to secure their respective people.â⬠¢ Reveal threats that are present to the respective monarchies. â⬠¢ Facilitate the policy makers with succinct information to start with. â⬠¢ Explore different fronts that these extremists target to exploit youth â⬠¢ Find out the weakness in our social systems that allows these ideologies to be successful â⬠¢ Discover the spectrum of sources in which cyber terrorism exists. â⬠¢ Find the roots of ideological extremism and its effects on current monarchy RESEARCH METHODOLOGY This research will be divided into two parts, as per the two portions of research question.To take views on ââ¬Å"whether ideological extremism is terrorism or notâ⬠, cyber-ter rorism to be specific, we will rely on qualitative measures of research. On the other hand, to find the ââ¬Å"extentâ⬠to which terrorists are making use of information warfare to spread ideological extremism, we will use quantitative measures of research. Qualitative Research Through this research, we wish to: â⬠¢ Understand views of respondents about the issue â⬠¢ Solicit their approach in reaching their respected viewpoints. â⬠¢ Explore the difference in opinion that exists in policy makers â⬠¢ Consider the possible impact of their thoughts over the people.Quantitative Research Through this approach, we wish to: â⬠¢ Understand the perception of youngsters about this issue â⬠¢ Discriminate respondents on the basis of their ethnicity and racism to understand involvement of any pattern among people of similar sects. â⬠¢ Materialize our results and statistically analyze how many of them could possibly be a victim of those terrorists in near future. S ample For Qualitative research, we aim to take inputs from different critics, terrorism analysts, cyber-crime writers, internet regulatory bodies, extremist group leaders, journalists, and writers on ââ¬Å"extremismâ⬠.These people will be selected on the basis of relevance, work in the respective fields, availability and quality of work. For Quantitative research, we aim to survey young students studying in different continents of the world. As all of them will be everyday user of internet, we also aim to distinguish them on the basis of their involvement in internet, and their socio-ethnic mindset about ideological extremism. Variables Major variables in the research will be: (measured as) â⬠¢ Involvement in current affairs (Ratio Scale: Weight assigned to each answer)â⬠¢ Knowledge about the issue (Ratio Scale: Weight assigned to each answer) â⬠¢ Understanding of issue (Ordinal Scale) â⬠¢ Involvement with the internet (Ordinal Scale) â⬠¢ Awareness about po ssible implications of issue (Ordinal Scale) â⬠¢ Views about the issue (Nominal Scale) Monitoring All these results will be checked for reliability, validity and practicality, as per the methods defined by the monitoring/scrutinizing body. These checks will ensure the consistency of responses, and the validity of data will be checked based upon two optimum limits provided by the monitoring body.PILOT STUDY In order to conduct a pilot study on the above mentioned topic, the literature selected, for secondary research, as a source of Qualitative research is linked in the appendix A. Purpose of this study is to understand the perspective of officials of Saudi Government regarding terrorism and ideological extremism. This study was analytical, as qualitative measures were expected out of this study. Description The document comprises of official statements by Saudi government and religious representatives.Their statements usually revolve around the issues of terrorism, war against t errorism, extremism and the teachings of Islam, combating extremist ideology, role of mosque as an institution, condemning immoral, unethical acts and supporting moderation. They withheld their solid stance against terrorism, and declared any one fighting against the custodians of Holy Kaââ¬â¢aba as non-Muslim. They also instigate their support to find out and tackle the roots of terrorism and extremism. Their stance on condemning extremism, violence and any form of terrorism is mitigating with the learning of Islam.Their religious scholars emphasized on the need of omitting deviant ideologies that have been developed between Muslims, and join together united as one creed, as a Muslim. They also highlighted that the reasons of deviant ideologies are lack of knowledge about the religion, and prejudiced in Fatwa. Most of their statements emphasized upon the basic theme of Islam, peace. They extended full support to international community in the war against terrorism. Outcomes of t he study Learning from the pilot study reveals â⬠¢ Saudi government takes terrorism as a threat to its nation, its territory, its religion, all Muslim Ummah, and non-Muslims.â⬠¢ They are the custodians of Holy places of Muslims. They take it as their duty to defend the religion that was gifted to them by their Holy Prophet. â⬠¢ All of the officials agree upon the solid stance they have against terrorism. They want to unite Muslims in order to protect the religion which has been badly reputed by ideological extremists. â⬠¢ Their views are diverged towards the central goal of achieving a peaceful state. They are being the voice of nation, and they stand to serve their people justly, with their lives and properties secured.
Thursday, January 2, 2020
Sophocles The Golden Age - 1864 Words
Sophocles was born about 496 BC in Colonus Hippius which is now a part of Athens, Greece, he was to become one of the great playwrights of the golden age. Sophocles was the son of Laius and Jocasta, both wealthy in the city that Sophocles grew up in. Luckily, He was the son of a wealthy merchant, he would enjoy all the perks of a successful Greek empire. Sophocles was provided with the best education which would help him in many ways in the future of his life. He studied the arts. By sixteen, he was already known around the city for his contribution to lead a choir of boys at a celebration of the victory of Salamis in a battle they had been fighting. Years later, he defeated Aeschylus, who was known to be a play writer also dealing with tragedies and other various kinds of plays that he wrote in his time. In 441 BC Sophocles was beaten in an Athenian play competition by Euripides. From 468 BC, however, Sophocles won many awards for his dramas and was noticed for his playwriting mind. Sadly, Sophocles life ended near 406 BC at about the age of 90 which was about the time Athens was in the golden age of plays and writings. Although, Sophocles wasnââ¬â¢t in politics or militarily, he was still elected twice to be in high military office. People would remember his contribution to the city and what he has done to change the way of the theatre. Sophocles wrote more than 100 plays of which seven complete tragedies and fragments of 80 or 90 others are preserved. He was the first toShow MoreRelatedThe Classical Tragedy Of Sophocles Oedipus The King950 Words à |à 4 Pagesââ¬Å"Greeceââ¬â¢s Golden Age introduced many excellent playwrights, all of whom contributed to the success of Greek Literatureâ⬠(sites.google/ Playwrights of the Golden Age). Sophocles, the author of the classic tragedy, Oedipus the King, was one of the three best play writers during that time frame. Born in 495 B.C., Sophocles ââ¬Å"lived for nearly ninety years through the most of the turbulent events of his country during the fifteenth century B.C.â⬠(Charters and Charters). He was born in Colonus, not farRead MoreEssay Greek Theater1157 Words à |à 5 Pages Ancient Greek Theater is the first historical record of ââ¬Å"drama,â⬠which is the Greek term meaning ââ¬Å"to doâ⬠or ââ¬Å"to act.â⬠Beginning in the 5th cent ury BC, Greek Theater developed into an art that is still used today. During the golden age of the Athenians plays were created, plays that are considered among the greatest works of world drama. Today there are thousands of well-known plays and films based on the re-make of ancient drama. nbsp;nbsp;nbsp;nbsp;nbsp;Theater originated from the religiousRead MoreAncient Greek Theater1235 Words à |à 5 Pagessuspenseful and masterful plot, conceived by the legendary playwright Sophocles, was one of the many groundbreaking works to come out of fifth century BC Greece. Works of ancient Greek theater, particularly Oedipus the King, embodied the spirit of innovation that fifth century BC Athens was known for. The fifth century BC in Athens, aptly known as the ââ¬Å"Golden Age,â⬠was a time of great achievements in art and philosophy. Sophocles and other notable Greek playwrights Euripides and Aeschylus flourishedRead MoreSophocles Oedipus The Most Brilliant And Creative Writers Of His Time858 Words à |à 4 PagesSophocles play ââ¬Å"Oedipus Tyrannusâ⬠is an enigma. His play includes incest, murder and self-enlightenment all leading into the main theme of fate. Athenians believed that fate is not left up to man, but that is provided solely on the whims of the gods. Because of his dramatic approach to his plays Sophocles was considered one of the most brilliant and creative writers of his time. Sophoclesââ¬â¢ play ââ¬Å"Oedipus Tyrannusâ⬠is about how Athenians view their gods and their fate. Athenians believed thatRead MoreGolden Age Essay820 Words à |à 4 Pageshave experienced a Golden Age when great advances were made in variety of different fields. A golden age is a period of time during which there a very high level of achievement is reached in particular field of activity, especially in art or literature. The most flourishing period for a nation or region. Two different cultures that experienced a Golden Age are the Greeks and Islam. With the Golden Age of the Athens and the Golden Age of Islam, the achievement of these two Golden Age still continue toRead MoreThe Saga Of Oedipus By Sophocles1082 Words à |à 5 Pagesthe boy was adopted into royalty. When the boy came of age he was told the same fate that had been told to his birth parents. Fearing his adoptive fatherââ¬â¢s life, he exiled himself from the land. On his journey, he met King Laius, thou gh not knowing it him, at a symbolic location: a crossroad. This emphasizes that it was Oedipusââ¬â¢ decision to kill Laius and travel to Thebes, but was that decision out of free will? Throughout Oedipus Rex, Sophocles employs several examples of a theme of predestined fateRead MoreThe Role of Fate in Oedipus the King Essay1051 Words à |à 5 Pagesin the plays and literature of the Greeks as is shown in Sophocles play Oedipus Rex Sophocles lived during the Golden Age of Greece. He is renowned as one of the greatest dramaticist of western literature. He was a greek through and through as he held important political positions, and he even served as the priest of the haling diety Amynos. During his life tragedies were popular plays of the greeks, and Sophocles noted for his writing abilites of the time, made one suchRead More Religious Beliefs in Aeschylus Oresteia, Homerââ¬â¢s Iliad, and Sophoclesââ¬â¢ Electra1659 Words à |à 7 PagesReligious Beliefs in Aeschylus Oresteia, Homerââ¬â¢s Iliad, and Sophoclesââ¬â¢ Electra The final and definitive defeat of the Persian army at the battle of Plataea represented the end of an age-long threat to Athens. But the victory was also a miracle, as all the odds were against the Athenians at the onset of the war. While Pericles took charge of Athens after the war and started the advance of democracy, religion also thrived. The rebuilding of the Acropolis and the construction of the ParthenonRead MoreThe World of Musical Theatre812 Words à |à 3 Pagessense of Musical Theatre, it is referred to the art of telling stories through or with songs. This art can be traced all the way back to the Ancient Greeks (5th century BC), where music was used to accompany their stage works. It has been said that Sophocles composed his own music to accompany his own stage plays. In Greek theatre, a ââ¬Å"Greek Chorusâ⬠was used in the play to comment on the actions. They were a part of the plot of the show, but no musical solos were present. The chorus was used also to beRe ad MoreBiography of Sophocles Essay1496 Words à |à 6 PagesBiography of Sophocles Sophocles was born near Athens, in the small town of Colonus, around 495 BC. His ninety-year life span coincided with the rise and fall of the Athenian Golden age. The son of Sophillus, a wealthy armor maker, Sophocles was provided with the best traditional aristocratic education available in Athens (Page 3). Very little is known about Sophocles as a youth, although one public record suggests his participation in ââ¬Å"The Chorus of Youths,â⬠chosen to celebrate the Athenian naval
Subscribe to:
Posts (Atom)